CloudSploit connects to your cloud accounts

Connect to Services

CloudSploit uses a secure, read-only process to connect to your AWS, Azure, or Oracle cloud accounts. We use this access to query metadata about your cloud environment - security group rule configuration, server placement, network layout, and hundreds of other settings.

Connect to Services
Save Information

Take hourly snapshots and watch continuous event streams

Save Information

CloudSploit performs configuration analysis as often as every hour to produce traditional scan reports. In AWS, CloudSploit also listens to security-sensitive API calls via AWS CloudTrail to report on potential security issues within seconds.

Analyze data for adherence to security best practices

Checklist

All of the data CloudSploit ingests is analyzed and compared to the expected results in a secure environment. When mismatches are detected, you're alerted instantly via email reports and integrations with third-party monitoring tools.

Checklist
Save Information

All source data is permanently deleted within 36 hours

Save Information

After obtaining a snapshot of data from the cloud account, CloudSploit saves the scan results in its database and permanently deletes all source data from its servers within 36 hours.

CloudSploit Security Report

Ready to test your security?

Get Started Now